6.5

CVE-2019-18790

An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x before 13.29.2, 16.x before 16.6.2, and 17.x before 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peer's IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peer's name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DigiumAsterisk Version >= 13.0.0 < 13.29.2
DigiumAsterisk Version >= 16.0.0 < 16.6.2
DigiumAsterisk Version >= 17.0.0 < 17.0.1
DigiumCertified Asterisk Version13.21.0
DigiumCertified Asterisk Version13.21.0 Updatecert1
DigiumCertified Asterisk Version13.21.0 Updatecert2
DigiumCertified Asterisk Version13.21.0 Updatecert3
DigiumCertified Asterisk Version13.21.0 Updatecert4
DigiumCertified Asterisk Version13.21.0 Updaterc1
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 7.42% 0.913
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 3.9 2.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
nvd@nist.gov 5.8 8.6 4.9
AV:N/AC:M/Au:N/C:P/I:P/A:N
CWE-862 Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.